This video demonstrates an automated tool that hackers use when decrypting password files.
Drive-By Download
Corey Nachreiner, CISSP, shows what happens when a Windows XP computer browses the kind of malicious Web site that takes over your PC the instant you visit.
Rootkits Part 2
Corey explains inline function hooking, what kinds of Windows functions are susceptible to hooking, and how rootkits use hooking for backdoor access to your network.
Rootkits Part 1
Corey defines rootkits, then demonstrates a real rootkit found in the wild. See what investigative processes it hides from, how an attacker configures it, and more.
Botnet Source Code for Overachievers
For IT professionals who crave depth. This screen-capture video supplement to “Understanding Threats: Malware Analysis: Botnets, Part 1” examines bot source code line by line.
Botnets Part 3
Learn the countermeasures, defenses, and Firebox tricks that render bots “Dead On Arrival” for your network.
Botnets Part 2
Learn how a bot herder uses his bot army for attacks such as Distributed Denial of Service, getting command line control of victims, installing spyware, and more.
Internet Explorer VML Exploit Revealed
Network security analyst Corey Nachreiner, CISSP, demonstrates how a zero-day security vulnerability in Internet Explorer can be exploited.
What Is a Sidejacking Attack?
Corey Nachreiner, CISSP, demonstrates how someone sitting near you at a wireless hotspot can steal your credentials for any Web account you log into…
Password Cracking 201: Rainbow Tables
“Rainbow tables” enable malicious hackers to break the encryption protecting password files.